메뉴 건너뛰기




Volumn 4052 LNCS, Issue , 2006, Pages 528-539

Invisible safety of distributed protocols

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER PROGRAMMING; NETWORK PROTOCOLS; SECURITY OF DATA; TOPOLOGY;

EID: 33746323976     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11787006_45     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 1
    • 0010193162 scopus 로고
    • A tutorial on specification and verification using PVS
    • Shankar, N., Owre, S., Rushby, J.M.: A tutorial on specification and verification using PVS. Technical report (1993)
    • (1993) Technical Report
    • Shankar, N.1    Owre, S.2    Rushby, J.M.3
  • 2
    • 0346353138 scopus 로고
    • STeP: The stanford temporal prover, user's manual
    • Computer Science Department, Stanford University
    • Bjørner, N., Browne, I., Chang, E., Colón, M., Kapur, A., Manna, Z., Sipma, H., Uribe, T.: STeP: The Stanford Temporal Prover, User's Manual. Technical Report STAN-CS-TR-95-1562, Computer Science Department, Stanford University (1995)
    • (1995) Technical Report , vol.STAN-CS-TR-95-1562
    • Bjørner, N.1    Browne, I.2    Chang, E.3    Colón, M.4    Kapur, A.5    Manna, Z.6    Sipma, H.7    Uribe, T.8
  • 4
    • 84903156915 scopus 로고    scopus 로고
    • Automatic deductive verification with invisible invariants
    • TACAS'01
    • Pnueli, A., Ruah, S., Zuck, L.: Automatic deductive verification with invisible invariants. In: TACAS'01, LNCS 2031 (2001) 82-97
    • (2001) LNCS , vol.2031 , pp. 82-97
    • Pnueli, A.1    Ruah, S.2    Zuck, L.3
  • 5
    • 36348969336 scopus 로고    scopus 로고
    • Parameterized verification with automatically computed inductive assertions
    • CAV'01
    • Arons, T., Pnueli, A., Ruah, S., Xu, J., Zuck, L.: Parameterized verification with automatically computed inductive assertions. In: CAV'01, LNCS 2102 (2001) 221-234
    • (2001) LNCS , vol.2102 , pp. 221-234
    • Arons, T.1    Pnueli, A.2    Ruah, S.3    Xu, J.4    Zuck, L.5
  • 7
    • 3242706682 scopus 로고    scopus 로고
    • Model checking and abstraction to the aid of parameterized systems
    • Zuck, L., Pnueli, A.: Model checking and abstraction to the aid of parameterized systems. Computer Languages, Systems, and Structures 30(3-4) (2004) 139-169
    • (2004) Computer Languages, Systems, and Structures , vol.30 , Issue.3-4 , pp. 139-169
    • Zuck, L.1    Pnueli, A.2
  • 11
    • 0003229324 scopus 로고    scopus 로고
    • Verification of a leader election protocol: Formal methods applied to IEEE 1394
    • Computing science Institute, Nijmegen
    • Devillers, M., Griffioen, W., Romijn, J., Vaandrager, F.: Verification of a leader election protocol: Formal methods applied to IEEE 1394. Technical Report CSI-R9728, Computing science Institute, Nijmegen (1997)
    • (1997) Technical Report , vol.CSI-R9728
    • Devillers, M.1    Griffioen, W.2    Romijn, J.3    Vaandrager, F.4
  • 12
    • 18944387681 scopus 로고    scopus 로고
    • Automatic verification of the IEEE 1394 root contention protocol with KRONOS and PRISM
    • Cleaveland, R., Garavel, H., eds. Volume 66.2 of Electronic Notes in Theoretical Computer Science., Elsevier
    • Daws, C., Kwiatkowska, M., Norman, G.: Automatic verification of the IEEE 1394 root contention protocol with KRONOS and PRISM. In Cleaveland, R., Garavel, H., eds.: Proc. 7th International Workshop on Formal Methods for Industrial Critical Systems (FMICS'02). Volume 66.2 of Electronic Notes in Theoretical Computer Science., Elsevier (2002)
    • (2002) Proc. 7th International Workshop on Formal Methods for Industrial Critical Systems (FMICS'02)
    • Daws, C.1    Kwiatkowska, M.2    Norman, G.3
  • 13
    • 26944445043 scopus 로고    scopus 로고
    • Simulating reachability using first-order logic with applications to verification of linked data structures
    • Lev-Ami, T., Immerman, N., Reps, T.W., Sagiv, S., Srivastava, S., Yorsh, G.: Simulating reachability using first-order logic with applications to verification of linked data structures. In: CADE. (2005) 99-115
    • (2005) CADE , pp. 99-115
    • Lev-Ami, T.1    Immerman, N.2    Reps, T.W.3    Sagiv, S.4    Srivastava, S.5    Yorsh, G.6
  • 14
    • 0004215089 scopus 로고    scopus 로고
    • Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
    • Lynch, N.A.: Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (1996)
    • (1996) Distributed Algorithms
    • Lynch, N.A.1
  • 16
    • 84941163693 scopus 로고    scopus 로고
    • Invisible safety of distributed protocols
    • Computer Science Department, New York University
    • Balaban, I., Pnueli, A., Zuck, L.: Invisible safety of distributed protocols. Technical report, Computer Science Department, New York University (2006) http://www.cs.nyu.edu/acsys/pubs/permanent/dist-protocols-icalp06-full. pdf.
    • (2006) Technical Report
    • Balaban, I.1    Pnueli, A.2    Zuck, L.3
  • 17
    • 0022807929 scopus 로고
    • A simple parallel algorithm for the maximal independent set problem
    • Luby, M.: A simple parallel algorithm for the maximal independent set problem. SIAM Journal of Computing 15(4) (1986) 1036-1053
    • (1986) SIAM Journal of Computing , vol.15 , Issue.4 , pp. 1036-1053
    • Luby, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.